203 resultados para Adaptive-ID security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents new methods for computing the step sizes of the subband-adaptive iterative shrinkage-thresholding algorithms proposed by Bayram & Selesnick and Vonesch & Unser. The method yields tighter wavelet-domain bounds of the system matrix, thus leading to improved convergence speeds. It is directly applicable to non-redundant wavelet bases, and we also adapt it for cases of redundant frames. It turns out that the simplest and most intuitive setting for the step sizes that ignores subband aliasing is often satisfactory in practice. We show that our methods can be used to advantage with reweighted least squares penalty functions as well as L1 penalties. We emphasize that the algorithms presented here are suitable for performing inverse filtering on very large datasets, including 3D data, since inversions are applied only to diagonal matrices and fast transforms are used to achieve all matrix-vector products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the speed and flux regulation of induction motors under the assumption that the motor parameters are poorly known. An adaptive passivity-based control is proposed that guarantees robust regulation as well as accurate estimation of the electrical parameters that govern the motor performance. This paper provides a local stability analysis of the adaptive scheme, which is illustrated by simulations and supported by a successful experimental validation on an industrial product. © 2009 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present reaction free energy calculations using the adaptive buffered force mixing quantum mechanics/molecular mechanics (bf-QM/MM) method. The bf-QM/MM method combines nonadaptive electrostatic embedding QM/MM calculations with extended and reduced QM regions to calculate accurate forces on all atoms, which can be used in free energy calculation methods that require only the forces and not the energy. We calculate the free energy profiles of two reactions in aqueous solution: the nucleophilic substitution reaction of methyl chloride with a chloride anion and the deprotonation reaction of the tyrosine side chain. We validate the bf-QM/MM method against a full QM simulation, and show that it correctly reproduces both geometrical properties and free energy profiles of the QM model, while the electrostatic embedding QM/MM method using a static QM region comprising only the solute is unable to do so. The bf-QM/MM method is not explicitly dependent on the details of the QM and MM methods, so long as it is possible to compute QM forces in a small region and MM forces in the rest of the system, as in a conventional QM/MM calculation. It is simple, with only a few parameters needed to control the QM calculation sizes, and allows (but does not require) a varying and adapting QM region which is necessary for simulating solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Genetic algorithms (GAs) have been used to tackle non-linear multi-objective optimization (MOO) problems successfully, but their success is governed by key parameters which have been shown to be sensitive to the nature of the particular problem, incorporating concerns such as the numbers of objectives and variables, and the size and topology of the search space, making it hard to determine the best settings in advance. This work describes a real-encoded multi-objective optimizing GA (MOGA) that uses self-adaptive mutation and crossover, and which is applied to optimization of an airfoil, for minimization of drag and maximization of lift coefficients. The MOGA is integrated with a Free-Form Deformation tool to manage the section geometry, and XFoil which evaluates each airfoil in terms of its aerodynamic efficiency. The performance is compared with those of the heuristic MOO algorithms, the Multi-Objective Tabu Search (MOTS) and NSGA-II, showing that this GA achieves better convergence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this Letter, we use a reconfigurable hologram to dynamically control the position of incidence of the pump beam onto a liquid-crystal dye-based laser. The results show that there is an increase in the stability of the laser output with time and the average power when compared with the output of the same laser when it is optically excited using a static pump beam. This technique also provides additional functionality, such as wavelength tuning and spatial shaping of the pump beam, both of which are demonstrated here. © 2013 Optical Society of America.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report the operation of a gigahertz clocked quantum key distribution system featuring high composable and quantifiable security while maintaining more than 1 Mbit/s secure key rate over a 50 km quantum channel. © OSA 2013.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters. © 2008 Springer-Verlag Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A binary grating on a Spatial Light Modulator generates twin antiphase spots with adjustable positions across the core of a multimode fibre allowing adaptive excitation of antisymmetric mode-groups for improving modal dispersion or modal multiplexing. © 2011 AOS.